Oct 4 cybersecurity
zero trust, ransomware, appsec, phishing, ai risks
Learn about the latest CyberSecurity Innovations, Threats and Solutions, covering Ransomware, Malware, Phishing Attacks, Generative AI Risks/Vulnerabilities, Endpoint Protection, Integrated On-Prem Infrastructure and Cloud Security, Zero Trust and more, featuring expert speakers from AWS and many other leading firms.
Here is typical and highly positive Angelbeat attendee feedback, this from the IT Director at a global pharmaceutical firm: “All the events that you host are always enjoyable because they are to the point, not a sales pitch and an educational, factual experience.”
Please use your Angelbeat account - created on the secure Memberspace platform, at no charge - to register to attend this webinar (hosted on Zoom), which also lets you download slides, watch on-demand videos, plus signup for future programs with one-click. If you already have an account, you will be asked to confirm your registration. Otherwise you are prompted to fill out a simple contact form.
If you have any questions email rgerber@angelbeat.com and we will get back to you right away.
Generative AI Safety: The OWASP Top 10 Vulnerabilities for LLM Apps: It seems there is a new article about AI safety in the media every day. Let’s unpack the myths and questions to truly understand the current state of AI and what it means to digital safety. In this session, we’ll discuss the OWASP Top 10 vulnerabilities for LLM apps and what they mean to organizations, whether they are currently using any AI or not.
1:45 Mark Milinkovich, Senior Director, Product Marketing
Stop Tomorrow's Zero-Day Attacks, Today: The shift from phishing to zero-day and one-day vulnerability exploits have many CISO’s feeling the pressure to rethink their security posture and refresh their defense in depth investments. The current external focus on threat intelligence leaves one clear gap in the armor of end point detect and response postures - the application runtime environment, and agent-based enforcement by security compensating controls to protect it. Learn how focusing on trust intelligence and modern runtime application control enforcement of authorized application dependencies at runtime will prevent malware, ransomware, and data breaches from exploiting in milliseconds.
2:25 De’Shedric Boler, Solutions Architect
Cloud Security and Shared Responsibility Model: Gain the control and confidence you need to securely run your business, with the most flexible and secure cloud computing environment available today. Learn how AWS has built the most secure cloud infrastructure platform. Get insights into the Shared Security Responsibility Model, which allocates responsibility for security threats/vulnerabilities/solutions across AWS, 3rd party vendors and end user organizations.
2:50 Roger Grimes, Data-Driven Defense Evangelist
Incredible Email Hacks You'd Never Expect and How You Can Stop Them: A majority of data breaches are caused by attacks on the human layer, but email hacking is much more than phishing and launching malware. From code execution and clickjacking to password theft and rogue forms, cybercriminals have more than enough email-based tricks that mean trouble for your InfoSec team. We will explore many ways hackers use social engineering and phishing to trick your users into revealing sensitive data or enabling malicious code to run.